{"id":52895,"date":"2025-02-08T19:53:01","date_gmt":"2025-02-09T03:53:01","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/palo-alto-networks-app-fuer-sumo-logic"},"modified":"2026-01-05T06:21:47","modified_gmt":"2026-01-05T14:21:47","slug":"palo-alto-networks","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/palo-alto-networks","title":{"rendered":"Palo Alto Networks-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-13e5ec56a93c6e9ff696022a277c755930439ace e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-6d13f63c1c4bb04cc134dcdc330878d4c6329f11  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-11e954515d01057e6ff102c45fe111b8\" id=\"improve-your-security-posture-and-enforce-specific-compliance-requirements\">St\u00e4rken Sie Ihre Sicherheit und setzen Sie spezifische Compliance-Anforderungen durch<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/in-depth-security-4.svg\" alt=\"\" class=\"wp-image-9802\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"improved-security-and-compliance\">Verbesserte Sicherheit und Compliance<\/h3>\n\n\n\n<p>Administratoren und SOC-Teams erhalten mit Visualisierungen, Warnmeldungen und Berichten sofortigen Einblick in ihre Sicherheits- und Compliance-Situation.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/collect-and-centralize-2.svg\" alt=\"\" class=\"wp-image-9803\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"aggregate-logs\">Aggregierte Protokolle<\/h3>\n\n\n\n<p>Kombinieren Sie Protokollmeldungen f\u00fcr \u00dcberwachung, Sicherheit und Netzwerkverkehr im Zusammenhang mit Ereignissen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/detect-6.svg\" alt=\"\" class=\"wp-image-9804\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"detect-suspicious-behavior\">Verd\u00e4chtiges Verhalten erkennen<\/h3>\n\n\n\n<p>Nutzen Sie Dashboards und Warnmeldungen, um Ausrei\u00dfer von Bedrohungen, Richtungen und mehr zu erkennen.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"499\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Overview_a_300ppi-1024x499-1.png\" alt=\"\" class=\"wp-image-9805\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Overview_a_300ppi-1024x499-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Overview_a_300ppi-1024x499-1-300x146.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Overview_a_300ppi-1024x499-1-768x374.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Overview_a_300ppi-1024x499-1-575x280.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"visibility-and-control\">Sichtbarkeit und Kontrolle<\/h2>\n\n\n\n<p>Palo Alto Networks Firewalls bieten Sichtbarkeit und granulare Kontrolle \u00fcber Netzwerkaktivit\u00e4ten basierend auf der Identifizierung von Anwendungen, Benutzern und Inhalten. Durch die Analyse der Protokolle dieser Firewalls haben Sie nun die M\u00f6glichkeit, Ihr Sicherheitsniveau zu verbessern und spezifische Compliance-Anforderungen durchzusetzen.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-efb28fde36310d8cb28353ad15e7e9c1df09193a e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-6e23960f93026a69260a54a644f2a4dbab6a8b2e e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\">Mit der Sumo Logic-Anwendung f\u00fcr Palo Alto Networks k\u00f6nnen Sie:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>den Datenverkehr \u00fcberwachen und mithilfe von Suchvorg\u00e4ngen und Dashboard-Visualisierung Bedrohungsanalysen durchf\u00fchren, um Ihr Unternehmen proaktiv zu sch\u00fctzen<\/li>\n\n\n\n<li>verd\u00e4chtige Quell-IPs mithilfe fortschrittlicher Analysen untersuchen, um die Aktivit\u00e4ten der Angreifer besser zu verstehen<\/li>\n\n\n\n<li>Palo Alto Networks Firewall-Ereignisse mit denen anderer Sicherheitssysteme korrelieren, um ein vollst\u00e4ndiges Bild aller Ihrer Sicherheitsdaten zu erhalten<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"499\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Threat_Analysis_a_300ppi-1024x499-1.png\" alt=\"\" class=\"wp-image-9806\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Threat_Analysis_a_300ppi-1024x499-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Threat_Analysis_a_300ppi-1024x499-1-300x146.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Threat_Analysis_a_300ppi-1024x499-1-768x374.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/PAN_Threat_Analysis_a_300ppi-1024x499-1-575x280.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":328,"featured_media":37368,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267,269],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267,269],"class_list":["post-52895","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security","integration-use-case-soar"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/328"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52895\/revisions"}],"predecessor-version":[{"id":64875,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52895\/revisions\/64875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/37368"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=52895"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=52895"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=52895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}